Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
References
Link | Resource |
---|---|
https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP | Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8ph | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-16T21:05:31.991Z
Updated: 2023-10-16T21:05:31.991Z
Reserved: 2023-09-20T15:35:38.148Z
Link: CVE-2023-43659
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-16T22:15:12.237
Modified: 2023-10-19T17:56:26.263
Link: CVE-2023-43659
JSON object: View
Redhat Information
No data.
CWE